N Goots, B Izotov, A Moldovyan, N Moldovyan - 2003 - books.google.com
Covering the specific issues related to developing fast block ciphers using software and hardware implementation, this book provides a general picture of modern cryptography …
S Agievich - Boolean Functions in Cryptology and Information …, 2008 - ebooks.iospress.nl
We study generalized regular bent functions using a representation by bent rectangles, that is, a particular class of matrices with certain rows and columns. We characterize affine …
Y Zheng, XM Zhang - Advances in Cryptology—ASIACRYPT 2000: 6th …, 2000 - Springer
We establish, for the first time, an explicit and simple lower bound on the nonlinearity N f of a Boolean function f of n variables satisfying the avalanche criterion of degree p, namely, N f≥ …
W Millan - International Conference on Cryptography: Policy and …, 1995 - Springer
We present an algorithm allowing the rapid identification of low order nonlinear Boolean functions. An extension of the method allowing the identification of good low order …
K Kurosawa, T Satoh - International Conference on the Theory and …, 1997 - Springer
A Boolean function f satisfies PC (l) of order k if f (x)⊕ f (x⊕ α) is balanced for any α such that 1≤ W (α)≤ l even if any k input bits are kept constant, where W (α) denotes the …
In this paper we investigate the efficiency of two immunological algorithms (CLONALG and opt-IA) in the evolution of Boolean functions suitable for use in cryptography. Although in its …
XM Zhang, Y Zheng, H Imai - Designs, Codes and Cryptography, 2000 - Springer
Due to the success of differential and linear attacks on a large number of encryption algorithms, it is important to investigate relationships among various cryptographic, including …
CM Adams - Information Processing Letters, 1992 - dl.acm.org
On immunity against Biham and Shamir's “differential cryptanalysis” | Information Processing Letters skip to main content ACM Digital Library home ACM Association for Computing …
P Stǎnicǎ, S Maitra - Electronic Notes in Discrete Mathematics, 2003 - Elsevier
In 1999, Pieprzyk and Qu presented rotation symmetric (RotS) functions as components in the rounds of hashing algorithm. Later, in 2002, Cusick and Stǎnicǎ presented further …